ALPINE-CVE-2019-13122

Source
https://security.alpinelinux.org/vuln/CVE-2019-13122
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2019-13122.json
JSON Data
https://api.test.osv.dev/v1/vulns/ALPINE-CVE-2019-13122
Upstream
Published
2019-07-10T17:15:12Z
Modified
2025-09-26T00:11:18.793923Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A Cross Site Scripting (XSS) vulnerability exists in the template tag used to render message ids in Patchwork v1.1 through v2.1.x. This allows an attacker to insert JavaScript or HTML into the patch detail page via an email sent to a mailing list consumed by Patchwork. This affects the function msgid in templatetags/patch.py. Patchwork versions v2.1.4 and v2.0.4 will contain the fix.

References

Affected packages

Alpine:v3.7 / patchwork

Package

Name
patchwork
Purl
pkg:apk/alpine/patchwork?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.3-r1

Affected versions

1.*

1.1.0-r0
1.1.1-r0
1.1.1-r1
1.1.1-r2
1.1.1-r3
1.1.2-r0
1.1.3-r0